Gensan Buy Premise

download Gensan Buy Premise

of 77

Transcript of Gensan Buy Premise

  • 8/2/2019 Gensan Buy Premise

    1/77

    gensan-buy.comOnline shopping, fastest, safest and the easiest way, RIGHT TO YOUR DOORS

    ORGANIZATION PROFILE

    Gensan-buy.com is an all Filipino website developed to cater needs of Generals and

    its patrons in terms of shopping needs by linking shoppers and shop owners

    through the web.

    Provides quick access to service providers, shop owners and business men through

    advertising and easy guide to their valued shoppers and patrons.

    Provides quick reference for shoppers and patrons for a wise buy. A great deal tobudgeting people.

    Provides access to freebies, gigs and discounts through promotion.

    TOP CLIENTS (Shop Owners):

    Gsano General Santos

    XCC Mall of General Santos

    PD Plaza General Santos

    Pitmart Mall of General Santos

    Hotel Dolres

    Tropican Beach Resort

    ZM South Mall

    Bobinson Mall

    Gensan Arcadia

    ENCOR Appliance Center

    1

  • 8/2/2019 Gensan Buy Premise

    2/77

    II. ABSTRACT

    Objective:

    As a non-profit organization, gensan-buy.com is dedicated to provide the most

    convenient access to Generals shoppers and patrons in promotions, discounts, gigs,

    and quick reference to budget-conscious people.

    This website has been developed to provide the most convenient way for

    shoppers in which, they can access real time pricing of commodities in different

    service providers of General Santos City and neighboring municipalities, cities and

    regions.

    Specific Objective of the site:

    Objective of doing this project is to enhance knowledge in the field of e-commerce using

    mainly php and htmlas a frontend and MySQL as the backend. Applying System

    Analysis and Design principle through basic application and guidelines.

    Addressing clients requirement and objectives of this site as follows:

    To increase the business of Client/s.

    To benchmark for a potential global advertising. To act as a middle men connecting Shoppers and Service Providers

    User can search for different options available.

    User can do on-line inquiry for basic price of commodities.

    User can use search engine to look for different services, discounts, promotions,

    available etc.

    So these are some of the objectives which we have to accomplish.

    Features of the site:

    It has the features of providing all the information online (through the net). About the

    commodity prices, Shop Owners promotion, discounts, sales, gigs, freebies and About

    the price comparison, if there is.

    2

  • 8/2/2019 Gensan Buy Premise

    3/77

    The site includes

    the search engine which gives both users easy way to find the products and

    promotions for a post.

    The site acts as a

    middle-ware for the Shoppers and Service Providers.

    III. Modules of project:

    The project can be divided in to two main modules.

    Registration module

    Shoppers and Shop Owners Administration module

    Module 1:Registration module, are divided into:

    Shoppers Registration.

    Service Provider Registration.

    Change Password for Shoppers.

    Change Password for Service Provider.

    Forget Password for Shoppers.

    Forget Password for Service Provider.

    Login for both Shoppers and Service Provider.

    3

  • 8/2/2019 Gensan Buy Premise

    4/77

    Module 2:

    Shoppers and Shop Owners Administration module are divided into two

    categories:

    o Shoppers Panelo Service Providers Panel

    Shoppers

    Search for product pricing, promotion, gigs, freebies, discounts of different service

    providers.

    Service Providers

    Add products

    Update Pricing of Commodities

    Post for available promotions, gigs, freebies, discounts and sales.

    Site Working:

    Case A Shoppers:

    Shoppers has to register him self with the site.

    This is a free site for Shoppers.

    After success full Log in Shoppers can view products and equivalent price available.

    Can inquire promotions, sales, discounts, gigs and freebies from different service

    providers.

    Case BService Providers:

    Service Providers has to register itself. This needs administrators verification.

    After success full Login Service Providers can register various products with equivalent

    price (itemized).

    Company can post promotion, discounts, sales, freebies, gigs with administrators

    approval.

    4

  • 8/2/2019 Gensan Buy Premise

    5/77

    Company can contact administrator for support and additional services.

    IV. SYSTEM ANALYSIS

    Existing System

    When the requirement of this system is putted before the team they was willing to know

    that how the employee of the company is working. Then the study is done it gives the

    result that all the work is done manually and there is nothing that help the employee to

    save the time and do the work with the system. All the documentation is done by theemployee of the company. A lot of works have to be done before the candidates are

    placed in an organization.

    All that the company needs to store about the job seekers must be written on the

    paper. Some times it is very difficult to know about some special highlights of the job

    seeker, because the information is stored on the paper and it is not clear that due to

    human error or by some other means this paper is lost and the information is now not in

    the hands of the company.

    At the time of hiring the companies policy says that the only those companies

    can hire who are registered with SEEKJOB. So it is critical task to find out the registered

    employer, when the company has so many employers.

    There is extra requirement of employee who have to check that the requesting

    person is an registered employer. This seams a critical task

    Limitations

    The current system have all the problems which generally in count in the manualsystem such as wastage of time, wastage of money, more efforts to work etc. if the

    responsible person wants the full information of the total sale of various models of the

    vehicles at various center at the evening then he/she can not get it. Because the current

    system work manually and it is very slow same as if he/she wants the total production

    then it take time. The current system can not give the fast response as needed. It also

    5

  • 8/2/2019 Gensan Buy Premise

    6/77

    does not keep records of grievances of the faults in the vehicles in various parts of the

    country. If he/she wants the information regarding the total stock at various warehouses

    at his\her office then using current system he\she can not get it.

    He\she can not get the full information on time. It may be late and this process is time

    consuming and generally the administrators receive the relevant information next day

    which is the major limitation of existing system.

    Proposed system:

    This site is an attempt to make the task of administrator as well as jobseekers easier.

    This project ensures the consistency by enabling the jobseekers to register themselves

    and to find the desired information of jobs, get them involved with the jobsite and can

    access the different services provided by the jobsite.

    The administrator has the right to know everything. He has the right to know the details

    of the jobseekers, has the right to change any service that the jobsite is currently

    providing or can add services which are not being provided currently. Even the

    customers passwords and hidden details are accessible by the administrator. Now

    jobseekers are able to apply online also. Through this system all works are done

    through computer so it results in fast service provider.

    The jobseekers can also contact the company officials through email or his contactnumbers but first they have to register themselves as a member by filling up a

    registration form which can be filled online. Once registered, jobseekers can access this

    jobsite and register for any services being provided by seekjob.com, that too online by

    sitting at home within a fraction of a second by a flick of a button.

    Aim of this project is to provide an environment helpful for administrator and jobseekers

    as well, so that, they find it easy to implement it without any harassment for the

    jobseekers also. This project is developed after a

    Through study of the existing manual system & the jobseekers requirements.

    Requirement analysis is concerned with identifying the basic function of software

    component in a hardware & software system.

    6

  • 8/2/2019 Gensan Buy Premise

    7/77

    Features of proposed system:

    The features of the proposed system are as follows.

    Provide the full information of employees/employer at various places at one site.

    Provide the full information of total vacancies at various regions at one site.

    Provide the full information of total vacancies of various industries/companies at one

    site.

    Helps the management to find out the current trend in industries as well as current

    manpower pool.

    V. RELATED STUDY

    Feasibility Study:

    A feasibility study is conducted to select the best system that meets performance

    requirement. This entails an identification description, an evaluation of candidate system

    and the selection of best system for he job. The system required performance is defined

    by a statement of constraints, the identification of specific system objective and a

    description of outputs.

    The key consideration in feasibility analysis are:

    Economic feasibility

    The proposed system is economically feasible because the cost involved in purchasing

    the hardware and the software are within approachable. The personal cost like salaries

    of employees hired are also nominal, because working in this system need not required

    a highly qualified professional. The operating-environment costs are marginal. The less

    time involved also helped in its economical feasibility.

    The benefits of this project include four types:

    Cost saving benefits

    7

  • 8/2/2019 Gensan Buy Premise

    8/77

    This project reduces the administrative and operational cost. Because of the reduction

    in the use of paper, use of labors the cost also reduces.

    Improve-service-level benefits

    Proposed system improves the systems performance because the current system is

    based on manual processing while the proposed system is based on computer

    processing.

    Improve-information-level benefits

    It provides better information in the stipulated space and time for decision-making.

    Time-saving-benefits

    It saves lots of time and provides the same result in a far lesser period of time.

    VI. SYTEM REQUIREMENT

    Technical Feasibility

    HARDWARE & SOFTWARE

    REQUIREMENT SPECIFICATIONS

    Hardware requirement for developmentHardware Configuration

    Processor : Intel Pentium 4 CPU, 2.66GHz

    Memory

    RAM : 256 MB DDR

    Hard Disk : 40 GB SATA

    Mouse : Quantum

    8

  • 8/2/2019 Gensan Buy Premise

    9/77

    Keyboard : Samsung (Multimedia Supported)

    Drive : CD-RW, Floppy drive

    Printer : HP-Laser printer

    Hardware requirement for Implementation

    Processor:

    Minimum : 1.8 GHz Pentium Processor

    Memory:

    RAM : 64 MB

    Hard Disk : 4 GB

    Display : 1024 * 768, True Type Color-32 Bit

    Mouse : Any Normal Mouse.

    Keyboard : Any window Supported Keyboard.

    Software requirement for development

    Software Configuration

    Operating System : Windows XP Professional

    Front End : PHP, HTML, Dreamweaver, JSP

    Back End : MySQL, Navicat for MySQL, XAMMP

    Behavioral Feasibility

    Employees of the company are habitual of working with manual system and dont

    have the knowledge of working in a computer application based environment that is

    used in their intranet and are generally resistant to make changes in their working

    attitude.

    9

  • 8/2/2019 Gensan Buy Premise

    10/77

    People are inherently resistant to change and computers have been known to

    facilitate changes. An estimate should be made of how strong a reaction the staffs are

    likely to have towards the development of an online computerized system because now

    this may lead to expulsion of some of the staffs from their jobs.

    So a system has to be chosen which will provide them much more facilities and

    less mental disturbance to check weather correct entry is entered and that too at its

    right place. The System will provide them automatic reporting and checks on entries

    while storing as well as entering. So the front end has been made user friendly for both

    the jobseekers and the employees.

    VII. SYSTEM DESIGN

    Symbols Used:-

    In order to create DFDs we used following symbols:-

    Input/Output

    Data Processing

    Flow of data

    1. One way data flow.

    2. Two way data flow.

    Data store

    10

  • 8/2/2019 Gensan Buy Premise

    11/77

    Database

    VIII.DATA FLOW DIAGRAM

    Get vacancy detail

    JOBSEEKERMANAGEMENT

    JOBSEEKER/USEREMPLOYEE/CONSULTANTGive

    Give details

    Give applicant details

    Get emp. details

    Report of selected applicants

    Give jobOpening

    Get vacancyDetails

    Selection processstatus

    Resume status

    0-Level Data Flow Diagram

    11

  • 8/2/2019 Gensan Buy Premise

    12/77

    Login UserLocation

    User ID

    Password

    Password

    User ID

    Ifvalid

    New User

    New UserPassword

    IfNew

    12

  • 8/2/2019 Gensan Buy Premise

    13/77

    Seeker loginProcess

    JobSection

    Seeker details

    Job seeker

    User

    Get details

    Search job &news

    News letter

    EmployerLogin

    process

    Employer Jobs

    New Employer login

    EMPLOYERId &

    Password

    Registration details

    Cominfo.

    Jobdetails

    Id &

    password

    Valid Id &

    password

    New Job seeker

    Registrationdetails

    Jobsearch

    Jobdetails

    2-Level data Flow Diagram

    User

    13

  • 8/2/2019 Gensan Buy Premise

    14/77

    IX. ER-DIAGRAM

    Has

    Registration

    Maintain

    Registration

    14

    Jobseeker

    Emp_idQualificatio

    nJob location

    FnameExperience

    Skills

    Speci.

    High Degree

    LName

    Jobseeker

    Manageme

    nt

    Jobs

    Com.

    Job Exp

    Job loc.

    UsernameJob cat.

    Email id

    Check

    User JobSeek

    Control

    Username

    Password

    Employer

    Company name

    Location

    Emil

    Reference_no

    Remark User name

    News letter

    Email

    Name

    Site map

    login

    Userna

    me

    Password

    Site login

  • 8/2/2019 Gensan Buy Premise

    15/77

    THE DATABASE

    DATABASE DESIGN

    In our data flow diagram, we give names to data flows, processes and data stores.

    Although the names are descriptive of data, they do not dive details .So following DFD,

    our interest is to build some details of the contents of data flows, processes and data

    store. A data dictionary is a structured repository of data about data .It is a set of

    rigorous definitions of all DFD data elements and data structures .The data dictionary

    for the current system has been given as under:

    Tables for Project:

    Employer: This table maintains details of Employer

    Field Name Data Type

    User name Text

    Password Text

    company-name Textcompany-location Text

    company email Text

    Jobs: This table maintains details of Jobs

    Field name Data type

    username TextJob company Text

    Job category Text

    Job location Text

    Job_exp Text

    Job email Text

    emp_phone Text

    emp_email Text

    15

    EmployerCheck Emp control

    Passwor

    d

  • 8/2/2019 Gensan Buy Premise

    16/77

    Vacancy: This table maintains detail of jobs for which vacancies are open

    Field Name Data Type

    User name Text

    Password Text

    fname Text

    lname Text

    email Text

    jobloc Text

    prfjobloc Text

    exp Text

    jcat Text

    key skills Text

    highest degree Text

    specialization Text

    ewsletter: This table stores and maintains status news

    Field Name Data Type

    Name Text

    email Text

    te admin: This table stores and maintains status site admin

    Field Name Data Type

    Username Text

    Password Text

    16

  • 8/2/2019 Gensan Buy Premise

    17/77

    17

  • 8/2/2019 Gensan Buy Premise

    18/77

    Main Form

    18

  • 8/2/2019 Gensan Buy Premise

    19/77

    Jobseeker login

    19

  • 8/2/2019 Gensan Buy Premise

    20/77

    New Jobseeker Signup

    20

  • 8/2/2019 Gensan Buy Premise

    21/77

    Employer login

    21

  • 8/2/2019 Gensan Buy Premise

    22/77

    New Employer Signup

    22

  • 8/2/2019 Gensan Buy Premise

    23/77

    Site administrator login

    23

  • 8/2/2019 Gensan Buy Premise

    24/77

    Tips

    24

  • 8/2/2019 Gensan Buy Premise

    25/77

    Interview Tips for Professionals

    25

  • 8/2/2019 Gensan Buy Premise

    26/77

    Resume Tips for Professionals

    26

  • 8/2/2019 Gensan Buy Premise

    27/77

    Job Fair List

    27

  • 8/2/2019 Gensan Buy Premise

    28/77

    Contact us

    28

  • 8/2/2019 Gensan Buy Premise

    29/77

    Newsletter Subscription

    29

  • 8/2/2019 Gensan Buy Premise

    30/77

    Hot Vacancies

    30

  • 8/2/2019 Gensan Buy Premise

    31/77

    IT JOBS Openings

    31

  • 8/2/2019 Gensan Buy Premise

    32/77

    New JOBS This Week

    32

  • 8/2/2019 Gensan Buy Premise

    33/77

    SeekJOBs.com success stories

    33

  • 8/2/2019 Gensan Buy Premise

    34/77

    JOBS For Disabled people

    34

  • 8/2/2019 Gensan Buy Premise

    35/77

    Job Fair list

    35

  • 8/2/2019 Gensan Buy Premise

    36/77

    36

  • 8/2/2019 Gensan Buy Premise

    37/77

    TestingTesting plays a critical role in quality assurance for software .Due to the limitation of the

    verification method for the previous phases, design and requirement fault also appear in

    the code. Testing is used to detect these errors, in edition to the error introduced during

    coding phase.

    Testing is a dynamic method for verification and validation, where the system is to

    be tested is executed and behavior of the system is observed. Due to this testing the

    failure of the system can be observed, from which the presence of fault can be

    deduced. However, separate activities have to be performed to identify the faults.

    There are two method of testing: functional and structural. In functional testing,

    the internal logic of the system under testing is not considered and the test cases are

    decided from the specification or the requirements. It is often called Black Box Testing.

    Equivalence class partitioning, boundary analysis, and cause effect graphing are

    examples of methods for selecting test cases for functional testing. In structural testing,

    the test cases are decided entirely on the internal logic of the program or module beingtested.

    As the goal of testing is to detect any errors in the programs different flavor of

    testing are often used. Unit testing are used to test a module or a small collection of

    modules and the focus is on detecting coding errors in modules. During integration

    testing modules are combined into sub-system, which are then tested. The goal here is

    to test the system design. In system testing and acceptance testing, the entire System

    is tested. The goal here is to test the requirement themselves. Structural testing can be

    used for unit testing while at higher level mostly functional testing is used.

    In the project Monthly Materialization Report System we used the unit testing

    and functional testing. System testing is a critical phase in systems implementation.

    Testing of a system involves hardware device testing and debugging of computer

    programs and testing information processing procedures. Testing can be done with test

    37

  • 8/2/2019 Gensan Buy Premise

    38/77

    data, which attempts to simulate all possible conditions that may arise during

    processing. The plane for testing are prepared and then implemented.

    The testing methods adopted in the testing of the system were Independent Unit

    Testing and System Testing

    Independent Unit Test (IUT)

    IUT focuses first on the modules, independently of one another, to locate errors. This

    enables the tester to detect errors in coding and logic that are contained within that

    module alone. Those resulting from the interaction between modules are initially

    avoided.

    IUT is generally white box oriented which is predicted on the close

    examination of procedural detail. It exercises all the logical decisions on their true and

    false side, executes all loops at their boundaries and within their operational bounds

    and checks whether the required validations have been met. White box testing

    exercises internal data structure to assure their validity.

    SYSTEM TESTING

    Here the system testing involved is the most widely used testing process consists of five

    stages as shown in the figure. In general, the sequence of testing activities is

    component testing, integration testing then user testing. However, as defects are

    discovered at any one stage, they required program modifications to correct them and

    this may required other stages in the testing process to be repeated.

    38

  • 8/2/2019 Gensan Buy Premise

    39/77

    (Component testing) (Integration testing) (User testing)

    Testing is the process of detecting errors. Testing performs a very critical role for quality

    assurance and for ensuring the reliability of the software. The results of testing are used

    later on during maintenance also.

    39

    Unit testing

    Moduletesting

    Acceptance testing

    Sub-systemtesting

    Systemtesting

  • 8/2/2019 Gensan Buy Premise

    40/77

    Testing is vital to the success of the system. System testing makes a logical assumption

    that if the parts of the system are correct, the goal will be successfully achieved. In

    adequate testing or non-testing leads to errors that may not appear until months or even

    years later (Remember the New York three day power failure due to a misplaced Break

    statement).

    This creates two problems:

    1. The time lag between the cause and the appearance of the problem.

    2. The time interval effect of the system errors on files and the records on the system.

    A small error can conceivably explode into a much larger problem. Effective testing

    early in the process translates directly into long term cost savings from a reduced

    number of errors.

    Another reason for system testing is its utility as a user oriented vehicle before

    implementation. The best program is worthless if it does not meet the user

    requirements. Unfortunately, the users demands are often compromised by efforts to

    facilitate program or design efficiency in terms of processing time or design efficiency.

    Thus in this phase we went to test the code we wrote. We needed to know if the code

    compiled with the design or not? Whether the code gave the desired outputs on given

    inputs? Whether it was ready to be installed on the users computer or some more

    modifications were needed?

    Through the web applications are characteristically different from there software

    counterparts but the basic approach for testing these web applications is quite similar.

    These basic steps of testing have been picked from software engineering practices. The

    following are the steps, we undertook:

    40

  • 8/2/2019 Gensan Buy Premise

    41/77

    1. The content of the Intranet site is reviewed to uncover Content errors. Content Errors

    covers the typographical errors, grammatical errors, errors in content consistency,

    graphical representation and cross referencing errors

    2. The design model of the web application is reviewed to uncover the navigation errors.

    Use cases, derived as a part of the analysis activity allows a web designer to exercise

    each usage scenario against the architectural and navigational design. In essence

    these non-executable tests help to uncover the errors in navigation.

    3. When web applications are considered the concept of unit changes. Each web page

    encapsulates content navigation links, content and processing elements (Forms,

    Scripts, JSPs as in our case). It is not always possible to test each of these individually.

    Thus is the base of the web applications the unit to be considered is the web page.

    Unlike the testing of the algorithmic details of a module the data that flows across the

    module interface, page level testing for web applications is driven by content,

    processing and links encapsulating the web page.

    4. The Assembled web application is tested for overall functionality and content delivery.The various user cases are used that test the system for errors and mistakes.

    5. The Web application is tested for a variety of environmental settings and is tested for

    various configurations and upon various platforms.

    The modules are integrated and integration test are conducted.

    1. Thread based testing is done to monitor the regression tests so that the site does not

    become very slow is a lot of users are simultaneously logged on.

    2. A controlled and monitored population of end users tests Intranet application, this all

    comprises of the User Acceptance Testing.

    41

  • 8/2/2019 Gensan Buy Premise

    42/77

    Because web application evolves continuously, the testing process is an ongoing

    activity, conducted by web support staff in our case the Organizations IS people who

    will finally update and manage the application.

    PSYCHOLOGY OF TESTING

    The aim of testing is often to demonstrate that a program works by showing that it has

    no errors. The basic purpose of testing phase is to detect the errors that may be present

    in the program. Hence one should not start testing with the intent of showing that a

    program works, but the intent should be to show that a program doesnt work. Testing is

    the process of executing a program with the intent of finding errors.

    TESTING OBJECTIVES:

    The main objective of testing is to uncover a host of errors, systematically and with

    minimum effort and time. Stating formally, we can say,

    1. Testing is a process of executing a program with the

    intent of finding an error.2. A successful test is one that uncovers an as yet

    undiscovered error.

    3. A good test case is one that has a high probability of

    finding error, if it exists.

    4. The tests are inadequate to detect possibly present

    errors.

    5. The software more or less confirms to the quality and

    reliable standards.

    LEVELS OF TESTING

    42

  • 8/2/2019 Gensan Buy Premise

    43/77

    In order to uncover the errors present in different phases, we have the concept of levels

    of testing. The basic levels of testing are

    Client Needs Acceptance Testing

    Requirements System Testing

    Design Integration Testing

    Code Unit Testing

    Unit testing

    Unit testing focuses verification effort on the smallest unit of software i.e. the module.

    Using the detailed design and the process specifications, testing is done to uncover

    errors within the boundary of the module. All modules must be successful in the unit test

    before the start of the integration testing begins.

    In this project each service can be thought of a module. There are so many modules

    like Login, HR Department, Interviewer Section, etc. Each module has been tested by

    giving different sets of inputs. When developing the module as well as finishing the

    development, the module works without any error. The inputs are validated when

    accepting them from the user.

    Integration Testing

    After unit testing, we have to perform integration testing. The goal here is to see if

    modules can be integrated properly, the emphasis being on testing interfaces between

    43

  • 8/2/2019 Gensan Buy Premise

    44/77

    modules. This testing activity can be considered as testing the design and hence the

    emphasis on testing module interactions.

    In this project the main system is formed by integrating all the modules. When

    integrating all the modules I have checked whether the integration effects working of

    any of the services by giving different combinations of inputs with which the two

    services run perfectly before Integration.

    SYSTEM TESTING

    Here the entire software system is tested. The reference document for this process is

    the requirements document, and the goal is to see if software meets its requirements.

    Here entire HRRP has been tested against requirements of project and it is checked

    whether all requirements of project have been satisfied or not.

    ACCEPTANCE TESTING

    Acceptance Testing is performed with realistic data of the client to demonstrate that the

    software is working satisfactorily. Testing here is focused on external behavior of the

    system; the internal logic of program is not emphasized.

    Test cases should be selected so that the largest number of attributes of an equivalence

    class is exercised at once. The testing phase is an important part of software

    development. It is the process of finding errors and missing operations and also a

    complete verification to determine whether the objectives are met and the user

    requirements are satisfied.

    WHITE BOX TESTING

    This is a unit testing method, where a unit will be taken at a time and tested thoroughly

    at a statement level to find the maximum possible errors.

    44

  • 8/2/2019 Gensan Buy Premise

    45/77

    I tested step wise every piece of code, taking care that every statement in the code is

    executed at least once. The white box testing is also called Glass Box Testing.

    I have generated a list of test cases, sample data, which is used to check all possible

    combinations of execution paths through the code at every module level.

    White-box test focuses on the program control structure. Test cases are derived

    to ensure that all statement in the program control structure. Test cases are derived to

    ensure that all statement in the program control structure. Test cases are derived to

    ensure that all statement in the program has been executed at least once during testing

    and that all logical conditions have been exercised. Basis path testing, a white box

    technique, makes use of program graphs (or graph matrices) to derive the set of linearly

    independent test that will ensure coverage. Condition and data flow testing further

    exercising degrees of complexity.

    BLACK BOX TESTING

    This testing method considers a module as a single unit and checks the unit at interface

    and communication with other modules rather getting into details at statement level.

    Here the module will be treated as a block that will take some input and generate

    output. Output for a given set of input combinations are forwarded to other modules.Black-box test are designed to uncover errors functional requirement without

    regard to the internal workings of a program. Black-box testing techniques focus on the

    information domain of the software, deriving test cases by partitioning the input and

    output domain of a program in manner that provides through test coverage. The black-

    box test is used to demonstrate that software functions are operational, that input is

    properly produced, and that the integrity of external information is maintained. A black-

    box test examines some fundamental aspect of a system with little or no regard for the

    integral logical structure of the software.

    Graph based testing methods explore the relationship between and behavior of

    program objects. Equivalence partitioning divides the input classes of data are likely to

    45

  • 8/2/2019 Gensan Buy Premise

    46/77

    exercise specific software function. Boundary values analysis probes the programs

    ability to handle data at the limits of acceptability.

    TEST INFORMATION FLOW

    A strategy for software testing may also be viewed in the context of the spiral. Unit

    testing begins at the vortex of the spiral and, concentrates on each unit, component of

    the software as implemented in source code. Testing progresses moving outward along

    the spiral to integration testing, where the focus is on designed the construction of the

    software architecture. Taking another turn outward on spiral, we encounter validation

    testing, where requirements established as part of software requirements analysis are

    validated against the software that has been constructed. Finally, we arrive at systemtesting, where the software and other system elements are tested as a whole. To test

    computer software, we spiral out along stream lines that broaden the scope of testing

    with each turn.

    Considering the process from a procedural point of view, testing within the context

    of software engineering is actually a series of four steps that are implemented

    sequentially. The steps are shown in Figure. Initially, tests focus on each component

    individually, ensuring that it functions properly as unit. Hence, the name unit testing.

    Unit testing makes heavy use of white-box testing techniques, exercising specific paths

    in modules control structure to ensure complete coverage and maximum error

    detection.

    46

    System Testing

    System Engineering

    Validation Testing

    Integration Testing

    Design

    Validation testing

  • 8/2/2019 Gensan Buy Premise

    47/77

    System Security

    SYSTEM SECURITY

    There are basically two types of security associated with this system:-

    1. Physical security:-

    Damage due to natural causes like earth tremor, flooding, water logging, fire

    hazards, atmospheric or environmental conditions etc.For overcoming these difficulties

    the replica of the data are automatically stored at various networks and for

    environmental conditions Air conditioning environment is created.

    2. Data security:-

    There are basically two problems associated with data security:-

    1. Data not being available to the authorized person at the time of need.

    2. Data becoming available to the unauthorized person.

    To overcome these difficulties the following access facilities has been provided:-

    i) Identification:-

    Unique Ids for the different users have been provided.

    ii) Authentication:-

    47

  • 8/2/2019 Gensan Buy Premise

    48/77

    System checks the password under the particular user identification. The

    computer permits the various resources to the authorized person.

    iii) Authorization:-

    The access control mechanism to prevent unauthorized logging to the system.

    48

  • 8/2/2019 Gensan Buy Premise

    49/77

    IMPLEMENTATION

    System implementation is the stage when the user has thoroughly tested the system

    and approves all the features provided by the system. The various tests are performed

    and the system is approved only after all the requirements are met and the user is

    satisfied.

    The new system may be totally new; replacing an existing manual or automatedsystem, or it may a major modification to an existing system. In the either case, proper

    implementation is essential to provide a reliable system to meet organization

    requirements .successful implementation may not guarantee improvement in the

    organization using the new system (that is a design question) ,but improper will prevent

    it.

    49

  • 8/2/2019 Gensan Buy Premise

    50/77

  • 8/2/2019 Gensan Buy Premise

    51/77

    51

  • 8/2/2019 Gensan Buy Premise

    52/77

    MAINTENANCE

    Software maintenance is the last phase in the software Engineering process that

    eliminates errors in the working system during its work span and to tune the system to

    any variations in its working environment. The system requires maintenance as there

    may be changes and requirements in the organizational needs, government policies,

    hardware and software environment etc. often small system deficiencies are found as a

    system is brought into operation and changes are made to remove them. System

    requirements may be revised as a result of system usage or changing operational

    needs. Perhaps oversight that occurred during the development process needs to be

    corrected. Often the maintenance need arises to capture additional data for storage in a

    database or in transaction files or perhaps it may be necessary to add error detection

    features to prevent system users from in adversely taking an unwanted action.

    Maintenance of the system after it is installed is concerned with an additional

    factor in hardware. Once the system is delivered and installed there is a brief warranty

    period during which time the vendor is responsible for maintenance. This is a typically a

    52

  • 8/2/2019 Gensan Buy Premise

    53/77

    90 day period after that time the purchaser has the option of acquiring maintenance

    from various sources. Maintenance source excepting vendor is also available from

    companies specializing in providing the service, called third party maintenance

    companies.

    When the system is installed, it is generally used for long period. The average life of

    system is 4-6 years, with the eldest applications often is used for over 10 years. The

    need for debugging and correcting errors or failure on an emergency basic is

    comparatively low: less than 20% of the task of correction. System and organization are

    in constant state of flux; therefore the maintenance of the system also involved

    adoptions for earlier version of software.

    Approximately 20% of all maintenance work is performed to accommodate

    changes in report, files and database. The greatest amount of maintenance work is for

    user enhancement, improved documentation and recording system components or

    greater efficiency. About 60% of all maintenance is for this purposed.

    Following table summarized the broad classes of maintenance found in

    development of sekkjob.com

    CATEGORY ACTIVITY Corrective Emergency fixes, routine debugging.

    AdaptiveAccommodation

    of changes to

    data and to

    hardware

    and software,

    Changes in the

    external

    environment.

    Pre effectiveUser

    53

  • 8/2/2019 Gensan Buy Premise

    54/77

    enhancement,

    improved

    documentation

    recording of

    computational

    efficiency, user

    recommendation

    s for new

    capabilities.

    Preventive

    Routine service

    of cleaning and

    adjusting the

    equipment to

    prevent

    breakdowns,

    future

    maintainability

    reliability

    enhancement,

    recovering

    design

    information to

    improve the

    overall quality.Maintainable Design

    The points to reduce the needs for maintenance are:

    More accurately defining the users requirements during the system development

    assembling better system documentation.

    54

  • 8/2/2019 Gensan Buy Premise

    55/77

    Using more effective methods for designing process logic and communicating it to

    project team members.

    Making better use of existing tools and techniques.

    Managing the system engineering process effectively.

    The maintenance for Integrated Advertising System was performed with the above-

    mentioned points as the underlying principles and according to the demands of the

    users.

    55

  • 8/2/2019 Gensan Buy Premise

    56/77

    CONCLUSION

    This is a well defined job of our team that has taken six weeks to analyze the situation in

    which this project will work and the environment of the company that will use this

    project.

    It was a good experience for us to work in a company that has a very friendly

    environment and learning atmosphere.

    I am very thankful to Mr. Mohd Gurfan khan.

    Who gave a lot of good programming skills and so many company related skills that will

    help me in the future?

    I am also thankful to all my friends and team members.

    56

  • 8/2/2019 Gensan Buy Premise

    57/77

    FUTURE SCOPE OF THIS PROJECT

    In future this project can be treated as product according to specification and needs of

    any organization.

    Since Jobseeker plays key role in any organization; thus, success over a long period of

    time and reliance of organization over recruitment is going to be one of the most

    considered topic for any organization. Therefore Jobs seeker Process will be of great

    help in carrying out recruitment process smoothly and effectively.

    At present days every organization is using web technology for their proper functioning,

    so this web based project is all in all important from market aspects.

    Furthermore if this project will be uploaded, it can be used as Jobs site and any

    organization can register their self on the site to carry out their recruitment process

    making this site as Jobs seeker.

    57

  • 8/2/2019 Gensan Buy Premise

    58/77

    LIMITATIONS

    Since, every system has some limitations so our proposed system is also not

    untouchable in this regard. Although it includes every kind of features but it cant be

    used in a huge organization where number of networks are very large, because the data

    base used in this system is an average one. Also it doesnt have different kind of access

    feature for different users.

    SOFTWARE SCOPE

    Reusability:

    Reusability is possible as and when we require in this application. We can

    update it next version. Reusable software reduces design, coding and testing cost by

    amortizing effort over several designs. Reducing the amount of code also simplifies

    understanding, which increases the likelihood that the code is correct. We follow up

    both types of reusability: Sharing of newly written code within a project and reuse of

    previously written code on new projects.

    Extensibility:

    This software is extended in ways that its original developers may not

    expect. The following principles enhance extensibility like Hide data structure, avoid

    traversing multiple links or methods, Avoid case statements on object type and

    distinguish public and private operations.

    Robustness:

    58

  • 8/2/2019 Gensan Buy Premise

    59/77

    Its method is robust if it does not fail even if it receives improper

    parameters. There are some facilities like Protect against errors, Optimize after the

    program runs, validating arguments and Avoid predefined limits.

    Understandability:

    A method is understandable if someone other than the creator of the

    method can understand the code (as well as the creator after a time lapse). We use the

    method, which small and coherent helps to accomplish this.

    Cost-effectiveness:

    Its cost is under the budget and make within given time period.

    It is desirable to aim for a system with a minimum cost subject to the condition that it

    must satisfy all the requirements.

    Scope of this document is to put down the requirements, clearly identifying the

    information needed by the user, the source of the information and outputs expected

    from the system.

    59

  • 8/2/2019 Gensan Buy Premise

    60/77

    60

  • 8/2/2019 Gensan Buy Premise

    61/77

    SITES REFERRED:

    1. http://www.sun.com

    2. http://www.coreservlets.com

    3. http://www.serverside.com

    4. http://www.w3schools.com

    5. http://www.google.com

    6. http://www.webopedia.com7. http://www.ddj.com

    BOOKS:

    J2EE by GARRY CORNELL. J2EE by Allamaraju & Buest (Apress Publications). JSP & Servlets by Marty Hall (SUN Microsystems) SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD. SOFTWARE ENGINEERING by IAN SOMMEVILLE.

    61

    http://www.sun.com/http://www.coreservlets.com/http://www.serverside.com/http://www.w3schools.com/http://www.google.com/http://www.webopedia.com/http://www.ddj.com/http://www.sun.com/http://www.coreservlets.com/http://www.serverside.com/http://www.w3schools.com/http://www.google.com/http://www.webopedia.com/http://www.ddj.com/
  • 8/2/2019 Gensan Buy Premise

    62/77

    62

  • 8/2/2019 Gensan Buy Premise

    63/77

    APPENDIX-A

    Backend remains on server side and has two components i.e.

    1. Server side program

    2. Data Base.

    Data base is the most important thing in this universe as data base gives identity to a

    thing without data base existence of a thing is impossible while working on a project first

    step is to design a database.

    What is data base?Data Base is a collection of tables and table is a collection of records in a tabular form

    i.e. in row and columns.

    Data Base can be divided into two parts:-

    1. RDBMS.

    2. DBMS.

    We will be using RDBMS (Relational Database Management System) in our project i.e.

    oracle 8i Enterprise edition.

    Why we are using Oracle (RDBMS)?

    Some of the merits of using Oracle (RDBMS) are as under:-

    Centralization of database.

    Client Server Technology.

    Security.

    Normalization of Data Base.

    Relationship.

    Transaction Processor.

    It gives some internet related features.

    Hence because of these features we are using Oracle as a back end technology.

    63

  • 8/2/2019 Gensan Buy Premise

    64/77

    ABOUT ORACLE 8i

    Oracle 8i contains all the features of previous version. It also supports some new

    features & enhancement to some existing features. Oracle servers provide deficient &

    effective solution for the major features.

    Large Database & Space Management Control

    Many Concurrent Database Performances

    High Transaction Processing Performance

    High Availability

    Controlled Availability

    Industry Accepted Standards

    Manageable Security

    Database Enforced Integrity

    Distributed Database System

    Portability

    Compatibility

    Connectivity

    NEW FEATURES OF ORACLE 8iImproved Scalability

    Improved Security

    Improved Performance Via Partition

    Enhanced Support for Database Replication

    Capability To Handle a Much Larger Number Of Concurrent Users

    New & Improved Data Types

    64

  • 8/2/2019 Gensan Buy Premise

    65/77

    APPENDIX-BWhat is Middle Ware?

    Middle Ware is a concept, Middle Ware provides centralization of business logic i.e.

    instead of putting logic on each and every client machine we put logic on a centralized

    server hence middle ware is nothing but a server side program where all your business

    logic and business methods reside. It remains on server side and it has all the logical

    building. Middle ware provides:-

    1. Multiple Client access.

    2. Centralized business logic in case of distributed application.

    Because we are working on Distributed Application Based Project we need platform

    independent Language:-

    Technology Used

    Introduction to Java

    Java is a high level, third-generation programming language, like C, Fortran, Perl and

    many others. It is a platform for distributed computing a development and run-time

    environment that contains built-in support for the World Wide Web.

    History of Java

    Java development began at Sun Microsystems in 1991, the same year the World Wide

    Web was conceived. Javas creator, James Gosling did not design java for the Internet.

    His Objective was to create a common development environment for consumer

    electronic devices which was easily portable from one device to another.

    This effort evolved into a language, code named Oak and later renamed Java thatretains much of the syntax and power of c++, but is simpler and more platform

    independent.

    Java Features

    Some of the important features of Java are as follows:

    Simplicity

    65

  • 8/2/2019 Gensan Buy Premise

    66/77

    Orientation

    Platform Independence

    Security

    High Performance

    Multi Threading

    Dynamic linking.

    Garbage Collection.

    One of the most important features of Java is Platform Independence which makes it

    famous and suitable language for World Wide Web.

    Why java is Platform Independent?

    Java is Platform Independent because of Java Virtual Machine (JVM).

    Java Virtual Machine (JVM)

    The client application or operating system must have a java byte-code interpreter to

    execute byte-code instructions. The interpreter is a part of a lager program called the

    JVM. The JVM interprets the byte code into native code and is available on a platform

    that supports java.

    Connectivity using JDBC

    There are four kinds of drivers available in Jdbc:-

    1. JdbcOdbc Bridge Driver.

    2. Partly Java Driver.

    3. Pure Java Driver.

    4. Native Driver.

    Client Side Interface:In client side interface we are using:-

    Servlet / JSP In Internet Based Application.

    66

  • 8/2/2019 Gensan Buy Premise

    67/77

    J2EE Framework and Architecture

    J2EE is one of the best solutions that we have had so far for meeting the demand of

    todays enterprise. J2EE specifies both the infrastructure for managing our applications,

    and the service APIs for building our applications.

    The J2EE platform is essentially a distributed application-server environment- a java

    environment that provides the following: -

    A set of java extension APIs to build applications. These APIs define a programming

    model for J2EE applications.

    A run time infrastructure for hosting and managing applications. This is the server

    runtime in which our applications resides.

    The applications that we could develop with the above may be programs to drive web

    pages, or components to implement complex database transactions, or even java

    applets, all distributed across the network.

    The J2EE Runtime

    While J2EE bundles together APIs that have been in existence in one form or another

    for quite sometime, perhaps its most significant aspect is the abstraction of the runtime

    infrastructure. The J2EE specification doesnt specify how a J2EE runtime should or

    could be built. Instead, J2EE specify roles and interfaces for applications, and theruntime onto which applications could be deployed. This results in a clear demarcation

    between applications and the runtime infrastructure. This demarcation allow the runtime

    to abstract most of the infrastructure services that enterprise developers have

    traditionally attempt to build on their own. As a result, J2EE application developers

    could just focus on the application logic and related service, while leveraging the

    runtime for all infrastructure-related services.

    Apart from specifying a set of standard APIs, the J2EE architecture also provides a

    uniform means of accessing platform-level services via its runtime environment. Such

    service includes distributed transactions, security, messaging etc.

    The J2EE APIs Used

    Distributed applications require access to a set of enterprise services. Typical services

    include transaction processing, database access, messaging, multithreading etc. The

    67

  • 8/2/2019 Gensan Buy Premise

    68/77

    J2EE architecture unifies access to such services in its enterprise service APIs.

    However, instead of having to access these service through proprietary or non standard

    interfaces, application programs in J2EE can access these APIs via the container.

    There are various API specification in J2EE framework which enable us to create an

    application at great speed with minimum effort.

    APIs Used To Build the Software

    1. JDBC API

    The JDBC API provides developers with a way to connect to relational data from

    within java code. Using the JDBC API, developers can create a client (which can be

    anything from an applet to an EJB) that can connect to a database, execute structured

    query language statements, and processes the result of those statements. The API

    provides connectivity and data access across the range of relational databases. It can

    do this because it provides a

    set of generic database access methods for sql compliant relational databases. JDBC

    generalizes the most common database access functions by abstracting the vendor

    specific detail of particular database. The result is set of classes and interface, placed in

    the java.sql package, which can be used with any database that has an appropriate

    JDBC drive. This allow JDBCconnectivity to be provided in a consistent way for any database. It also means that with

    a little care to ensure the application confirms to the most commonly available database

    features, an application can be use with a different database simple by switching to a

    different JDBC driver. JDBC includes following packages for the means of database

    accessing and provides various features of the database. The packages are as follows:

    -

    java.sql Package: -

    This package contains classes and interfaces designed with traditional client/server in

    mind. Its functionality is focused primarily on basic database programming services

    such as creating connections, executing statements and prepared statements, and

    running batch queries. Advanced functions such as batch updates, scrollable result

    sets, transaction isolation, and sql data types are also availabl

    68

  • 8/2/2019 Gensan Buy Premise

    69/77

    javax.sql Package: -

    This package introduces sum major architectural change to JDBC programming

    compared to java.sql package, and provides better abstractions for connections

    management, distributed transactions, and legacy connectivity. This package also

    introduces container-managed connection pooling, distributed transactions, and row

    sets.

    2. Java Servlets: -

    Servlets are Java technologys answer to Common Gateway Interface (CGI)

    programming. They are programs that run on a Web server, acting as middle layer

    between a requests coming from a Web browser or other HTTP client and databases or

    applications on the HTTP server. Their job is to:

    Read any data sent by the user.

    This data is usually entered in a form on a Web page, but could also come from a Java

    applet or a custom HTTP client program.

    Look up any other information about the request that is embedded in the HTTP

    request.

    This information includes details about browser capabilities, cookies, the host name of

    the requesting client, and so forth.Generate the results.

    This process may require talking to a database, executing an RMI or CORBA call,

    invoking a legacy application, or computing the response directly.

    Format the results inside a document.

    In most cases, this involves embedding the information inside an HTML page.

    Set the appropriate HTTP response parameters.

    This means telling the browser what type of document is being returned (e.g., HTML),

    setting cookies and caching parameters, and other such tasks.

    Send the document back to the client.

    This document may be sent in text format (HTML), binary format (GIF images), or even

    in a compressed format like gzip that is layered on top of some other underlying format.

    Many client requests can be satisfied by

    69

  • 8/2/2019 Gensan Buy Premise

    70/77

    returning pre-built documents and these requests would be handled by the server

    without invoking servlets. In many cases, however, a static result is not sufficient, and a

    page needs to be generated for each request.

    Java Server Pages: -

    Java Server Pages (JSP) technology enables you to mix regular, static HTML with

    dynamically generated content from servlets. Many Web pages that are built by CGI

    programs are primarily static, with the parts that change limited to a few small locations.

    For example, the initial page at most on-line stores is the same for all visitors, except for

    a small welcome message giving the visitors name if it is known. But most CGI

    variations, including servlets, make you generate the entire page via your program,

    even though most of it is always the same. JSP lets you create the two parts separately.

    Listing 1.1 gives an example.

    Most of the page consists of regular HTML, which is passed to the visitor

    unchanged. Parts that are generated dynamically are marked with special HTML-like

    tags and mixed right into the page.

    The Advantages of JSP

    JSP has a number of advantages over many of its alternatives. Here are a few of them.

    Versus Active Server Pages (ASP)ASP is a competing technology from Microsoft. The advantages of JSP are twofold.

    First, the dynamic part is written in Java, not VBScript or another ASP-specific

    language, so it is more powerful and better suited to

    complex applications that require reusable components. Second, JSP is portable to

    other operating systems and Web servers; you arent locked into Windows NT/2000 and

    IIS. You could make the same argument when comparing JSP

    to ColdFusion; with JSP you can use Java and are not tied to a particular server

    product.

    Versus Pure Servlets

    JSP doesnt provide any capabilities that couldnt in principle be accomplished with a

    servlet. In fact, JSP documents are automatically translated into servlets behind the

    70

  • 8/2/2019 Gensan Buy Premise

    71/77

    scenes. But it is more convenient to write (and to modify!) regular HTML than to have a

    zillion println statements that generate the HTML. Plus, by separating the presentation

    from the content, you can put different people on different tasks: your Web page design

    experts can build the HTML using familiar tools and leave places for your servlet

    programmers to insert the dynamic content.

    Versus Server-Side Includes (SSI)

    SSI is a widely supported technology for inserting externally defined pieces into a

    static Web page. JSP is better because you have a richer set of tools for building that

    external piece and have more options regarding the

    stage of the HTTP response at which the piece actually gets inserted. Besides, SSI is

    really intended only for simple inclusions, not for real programs that use form data,

    make database connections, and the like.

    Versus Static HTML

    Regular HTML, of course, cannot contain dynamic information, so static HTML pages

    cannot be based upon user input or server-side data sources. JSP is so easy and

    convenient that it is quite reasonable to augment HTML pages that only benefit slightly

    by the insertion of dynamic data. Previously, the difficulty of using dynamic data

    precluded its use in all but the most valuable instances.

    APPENDIX-C

    What is HTML?

    HTML (Hyper Text Markup Language): A markup language used to structure text andmultimedia documents and to set up hypertext links between documents, used

    extensively on the World Wide Web. HTML is a display language, not a programming

    language. HTML is a markup language (the ML in HTML) that uses a fixed set of

    markup tags.

    71

  • 8/2/2019 Gensan Buy Premise

    72/77

    HTML itself is the set of customizable markup tags that are inserted into HTML

    document govern its format, multimedia content, and hyperlinks. Any HTML viewer can

    display such documents but they are normally viewed usinga Web browser.

    HTML is a programming language in that an HTML document is a program that, when

    run by a browser, displays its text as hypermedia (multimedia with hyperlinks).

    The language HTML is really only a collection of predefined tags which , when

    inserted into regular text, tell a web browser how to:

    a. Format the document and its text.

    b. Incorporate i.e. insert a graphic image, video sequence, or sound clip into the

    displayed document.

    c. Link into other locations, in the same document, in another web page, or even on

    another computer (Server), or

    d. Link to other programs written in Java, JavaScript or other languages (called CGI

    applications).

    Features of HTML:-

    HTML stands for Hyper Text Markup Language.

    An HTML file is a text file containing small markup tags.

    The markup tag tells the Web browser how to display the page.

    An HTML file must have an htm or html file extension.

    An HTML file can be created using a simple text editor.

    Its a display-only technology.

    APPENDIX-D

    What is JAVASCRIPT?

    JavaScript is a compact, object-based scripting language. It can provide

    interactive web pages, validate from data, and make your web page clearer. JavaScript

    is a lightweight interpreted scripting language. The language is most well known for its

    use in wesites.It was originally developed by Brendan Each of Netscape

    Communications. It adds interactive functions to HTML pages, which are otherwise

    static. JavaScript is easier to use than Java, but not as powerful and deals mainly with

    72

  • 8/2/2019 Gensan Buy Premise

    73/77

    the elements on the Web page. On the client, JavaScript is maintained as source code

    embedded into an HTML page. On the Server, it is compiled into byte code

    (intermediate language), similar to Java programs.

    Features of JavaScript:-

    JavaScript was designed to add interactively to HTML pages.

    JavaScript is a scripting language-a scripting language is a lightweight programming

    language.

    A JavaScript is usually embedded directly in HTML pages.

    A JavaScript is an interpreted language (means that script execute without preliminary

    compilation).

    All major browsers, like Netscape and Internet Explorer, support JavaScript.

    Functions of JavaScript:-

    JavaScript gives you the ability to perform the following functions:

    Control document appearance and content

    Control the browser

    Interact with document content

    Interact with the user

    Read and write client state with cookies

    Interact with applets

    Manipulate Embedded Images

    Limitations of JavaScript:-

    JavaScript does not have any graphics capabilities

    Client-side JavaScript can not read or write files

    JavaScript does not support networking of any kind

    JavaScript doesnt have any multithreading capabilities.

    73

  • 8/2/2019 Gensan Buy Premise

    74/77

    74

  • 8/2/2019 Gensan Buy Premise

    75/77

    Analysis:

    Breaking a problem into successively manageable parts for individual study.

    Attribute:

    A data item that characterizes an object.

    Cost/Benefit Analysis:

    The purpose of the comparing the projected savings and benefits to projected to coststo decide whether the system change is justified.

    Data Base:

    A store of integrated data capable being directly addressed for multiple user; it is

    organized so that various files can be accessed through a single referenced based on

    the relationship among records in the file rather than the physical location.

    DBMS:

    The software that determines how data must be structured to produce the users view;

    and maintain update the system.

    Data Flow:

    Moment of data in a systems from appoint of origin to specific destination indicated

    by a line and arrow.

    Data Security:

    75

  • 8/2/2019 Gensan Buy Premise

    76/77

    Protection of data from loss, disclosure, modification or destruction.

    Data Structure:

    Logically related set of data that can be decomposed into lower level data elements;

    a group of data elements handled as a unit.

    Design:

    Process of devolving the technical and operational specification of a candidate system

    for implementation.

    Feasibility Study:

    A procedure that identifies describes and evaluates candidate systems and selects the

    best system for implementation.

    File:

    Collection related records organized for a particular purpose also called a data set.

    Flow Chart:

    A graphic picture of the logical steps and sequence involved in a procedure or a

    program.

    Form:

    A physical carrier of data of information.

    Implementation:

    In system development- a phase that focuses on user training, site preparation andfile conversion for installing a candidate system.

    Maintenance:

    Restoring to its original condition.

    Normalization:

    A process of replacing a given file with its logical equivalent; the object is true derive

    sample file with no redundant elements.

    Operating System:

    In data base machine based software that facilitates the availability information or

    reports through the DBMS.

    Password:

    Identity authenticator a key that allow access to a program system or procedure.

    Pert:

    76

  • 8/2/2019 Gensan Buy Premise

    77/77

    A flow system model used to manipulate various values as a basis for determining

    the critical path to interpret this relationship and to relate them back to the real world as

    a control technique.

    Record:

    A collection of aggregates or related item of data treated as a unit.

    Source code:

    A procedure or format that allow enhancement on a software package.

    System:

    A regular or orderly arrangement of components or parts in a connected and

    interrelated series or whole; a group of components necessary to some operation.

    System Design:

    Detailed concentration on the technical and other specification that will make the new

    system operational.

    System Development Life Cycle:

    A structured sequence of phases for implementing an information system.

    System Testing:

    Testing the whole system by the user after major programs and sub systems have been

    tested.Unit Testing Validation:

    Testing changes made in an existing or new programs. checking the quality of software

    in both simulated and live environment